DOI QR코드

DOI QR Code

The Legal Justice of Conferring Criminal Negligence on Chief Privacy Officers(CPO)

개인정보관리자의 책임과 벌칙의 형평성

  • Received : 2011.05.21
  • Accepted : 2011.09.06
  • Published : 2011.12.31

Abstract

The recently revised "Telecommunications Business Promotion and Personal Data Protection Act" is an important legal milestone in promoting the Korean telecommunications infrastructure and industry as well as protecting individuals' personal data and individuals' rights to privacy. Special characteristics of information security and privacy protection services including public goods' feature, adaptiveness, relativity, multi-dimensionality, and incompleteness, are reviewed. The responsibility of chief security/privacy officers in the IT industry, and the fairness and effectiveness of the criminal negligence in the Telecommunications Act are analyzed. An assessment of the rationale behind the act as well as a survey of related laws and cases in different countries, offers the following recommendations : i) revise the act and develop new systems for data protection, ii) grant a stay of execution or reduce the sentence given extenuating circumstances, or iii) use technical and managerial measures in data protection for exemption from criminal negligence.

Keywords

References

  1. 기광도, "법위반에 대한 처벌의 억제효과분석", 형사정책, 제16권, 제2호(2004).
  2. 김정호, 이완재, 사이버 공간의 법경제학, 법문사, 2004.
  3. 김혜경, "전기통신기본법상 형사처벌규정의 검토", 법학연구, 제18권(2008).
  4. 박상기, "형법상 법익유형과 법정형에 관한 소고", 형사법연구, 제19권(2007).
  5. 서동일, "차세대 정보보호 기술", 정보보호뉴스, 2003.
  6. 손동권, "법정형의 종류와 가감에 관한 한독의 비교", 형사정책, 제7호(1995).
  7. 오기두, "미국의 형벌제도," 저스티스, 2004.
  8. 오길영, "인터넷 통제구조에 대한 비판적 검토-정보통신망 이용촉진 및 정보보호 등에 관한 법률을 중심으로", 민주법학, 제37권 (2008).
  9. 오병민, "암흑의 DDoS 공격 거래 현장 포착", 보안뉴스, 2009.
  10. 이준택, 정보보호학 개론, 생능출판사, 2007.
  11. 이창범, 김본미, 개인정보피해구제 및 배상기준에 관한 연구, 한국정보보호진흥원/개인정보분쟁조정위원회, 2004.
  12. 전지연, "인터넷 피싱의 형사법적 책임", 형사정책연구, 제20권, 제4호(2009).
  13. 정영일, 형법개론, 3판, 박영사, 2009.
  14. 조용철, "정보관련 특별법 용어, 형량 제각각", 법률신문, 2000.
  15. Becker, G. S., "Crime and Punishment : An Economic Approach", Journal of Political Economy, Vol.76, No.2(1968).
  16. Bellia, P. L., P. Berman, and D. Post, Cyberlaw, 2nd ed., Thomson West, 2003.
  17. Cary, P., Data Protection : A Practical Guide to UK and EU Law, Oxford University Press, 2004.
  18. Cooter, R. and T. Ulen, Law and Economics, 5th ed., Pearson Education, 2008.
  19. Lininger R. and R. D. Vines, Phishing : Cutting the Identity Theft Line, Wiley, 2005.
  20. Postner, R. A., Economic Analysis of Law, 6th ed., Aspen Publishers, 2003.
  21. Provos, N., M. Rajab, and P. Mavrommatis, "Cybercrime 2.0 : When the Cloud Turns Dark", Communications of the ACM, Vol.52, No.4(2009).
  22. Schwartz, P. M. and D. J. Solove, Information Privacy Statues and Regulations, Wolters Kluwer, 2008.